7.8 CVE-2023-33204
Patch
sysstat through 12.7.2 allows a multiplication integer overflow in check_overflow in common.c. NOTE: this issue exists because of an incomplete fix for CVE-2022-39377.
https://nvd.nist.gov/vuln/detail/CVE-2023-33204
Categories
CWE-190 : Integer Overflow or Wraparound
An integer overflow or wraparound occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may wrap to become a very small or negative number. While this may be intended behavior in circumstances that rely on wrapping, it can have security consequences if the wrap is unexpected. This is especially the case if the integer overflow can be triggered using user-supplied inputs. This becomes security-critical when the result is used to control looping, make a security decision, or determine the offset or size in behaviors such as memory allocation, copying, concatenation, etc.
References
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:sysstat_project:sysstat:*:*:*:*:*:*:*:* | <= 12.7.2 |
REMEDIATION
Patch
Url |
---|
https://github.com/sysstat/sysstat/pull/360 |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
Other (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
92 | Forced Integer Overflow |
High |
MITRE
Sherlock® flash
Take a picture of your computer network in a few clicks !
The Sherlock® flash audit solution allows you to perform an audit to strengthen the security of your IT assets. Vulnerability analysis of your physical and virtual equipment. Patch planning by priority level and time available. Detailed and intuitive reporting.
